Quantcast
Channel: CPS-VO - Software verification
Browsing all 13 articles
Browse latest View live

From SMT Solvers to Verifiers

ABSTRACT Aws Albarghouthi License:  Creative Commons 2.5 read more

View Article



Techniques for Scalable Symbolic Simulation

ABSTRACTSymbolic simulation is a powerful technique for building mathematical models describing a program's results by simulating execution while interpreting inputs as symbolic variables. Such models...

View Article

Using model checking for Trivial File Transfer Protocol validation

Alrabaee, S., Bataineh, A., Khasawneh, F.A., Dssouli, R..  2014.  Using model checking for Trivial File Transfer Protocol validation. Communications and Networking (ComNet), 2014 International...

View Article

Semantics of Optimization for Real-Time Intelligent Embedded Systems (SORTIES)

Abstract:Optimization algorithms used in a real-time and safety-critical context offer the potential for considerably advancing robotic and autonomous systems by improving their ability to execute...

View Article

From SMT Solvers to Verifiers

ABSTRACT Aws Albarghouthi License:  Creative Commons 2.5 read more

View Article


Techniques for Scalable Symbolic Simulation

ABSTRACTSymbolic simulation is a powerful technique for building mathematical models describing a program's results by simulating execution while interpreting inputs as symbolic variables. Such models...

View Article

Using model checking for Trivial File Transfer Protocol validation

Alrabaee, S., Bataineh, A., Khasawneh, F.A., Dssouli, R..  2014.  Using model checking for Trivial File Transfer Protocol validation. Communications and Networking (ComNet), 2014 International...

View Article

Semantics of Optimization for Real-Time Intelligent Embedded Systems (SORTIES)

Abstract:Optimization algorithms used in a real-time and safety-critical context offer the potential for considerably advancing robotic and autonomous systems by improving their ability to execute...

View Article


Static analysis for web service security - Tools amp; techniques for a secure...

Masood, A., Java, J..  2015.  Static analysis for web service security - Tools amp; techniques for a secure development life cycle. 2015 IEEE International Symposium on Technologies for Homeland...

View Article


HACL*: A Verified Modern Cryptographic Library

Zinzindohoué, Jean-Karim, Bhargavan, Karthikeyan, Protzenko, Jonathan, Beurdouche, Benjamin.  2017.  HACL*: A Verified Modern Cryptographic Library. Proceedings of the 2017 ACM SIGSAC Conference on...

View Article

Safe and Efficient Cyber-Physical Operation System for Construction Equipment

Mani Golparvar-Fard Chimay Anumba Timothy Bretl John Messner License:  Creative Commons 2.5

View Article

Improved Invariant Generation for Industrial Software Model Checking of Time...

Todorov, Vassil, Taha, Safouan, Boulanger, Frédéric, Hernandez, Armando.  2019.  Improved Invariant Generation for Industrial Software Model Checking of Time Properties. 2019 IEEE 19th International...

View Article

Software Safety Verification Framework based on Predicate Abstraction

Haowei, Liang, Chunyan, Hou, Jinsong, Wang, Chen, Chen.  2021.  Software Safety Verification Framework based on Predicate Abstraction. 2021 IEEE 45th Annual Computers, Software, and Applications...

View Article

Browsing all 13 articles
Browse latest View live


Latest Images